January, 2016

article thumbnail

FaceSense: Sometimes (OK, A Lot of Times) Your Predictions Are A Tad Early

John Battelle's Searchblog

The post FaceSense: Sometimes (OK, A Lot of Times) Your Predictions Are A Tad Early appeared first on John Battelle's Search Blog. Way back in 2012 – four years ago in real time, three decades or so in Internet time – I predicted that Facebook would build an alternative to Google’s AdSense based on its extraordinary data set. I was right, but…off by a few years.

article thumbnail

Anti-Terrorism Law Enacted in China

Hunton Privacy

On December 27, 2015, the Standing Committee of the National People’s Congress of the People’s Republic of China published the P.R.C. Anti-Terrorism Law. The law was enacted in response to a perceived growing threat from extremists and terrorists, particularly in regions in Western China, and came into effect on January 1, 2016. As its name suggests, the main goal of the law is to strengthen national security and to prevent terrorism.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How email in transit can be intercepted using dns hijacking

Elie

This post looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack. While our research on the state of email delivery security indicates that this attack is less pervasive than the TLS downgrade attack discussed in a previous post, it is equally effective at defeating email in-transit encryption.

article thumbnail

How ‘smart’ is your smart working strategy?

CGI

How ‘smart’ is your smart working strategy? ravi.kumarv@cgi.com. Thu, 01/28/2016 - 07:02. When I talk with friends, family and my clients about the current people challenges in business, there’s often a lot of interest and hot debate about ‘ Smart’ Working …indeed when I joined CGI, one of the things that attracted me as a prospective employee was the company’s philosophy on being outcome focused, providing opportunities to work flexibly and a commitment to employee wellbeing and the work-life b

Paper 40
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Vulnerability Scanners and HTTP Headers

Roger's Information Security

This week Tenable released a new “plugin” (what they call a vulnerability detection) named “Web Server HTTP Header Information Disclosure”, plugin id 88099. In spite of even the title saying it only an information disclosure vulnerability, they rate this a medium. In my environment that means we need to address it. I think its a little crazy for an information disclosure vulnerability to be rated that high.

More Trending

article thumbnail

Mobile Gets a Back Button

John Battelle's Searchblog

The post Mobile Gets a Back Button appeared first on John Battelle's Search Blog. I just opened an email on my phone. It was from a fellow I don’t know, inviting me to an event I’d never heard of. Intrigued, I clicked on the fellow’s LinkedIn, which was part of his email signature. That link opened the LinkedIn app on my phone. In the fellow’s LI feed was another link, this one to a tweet he had mentioned in his feed.

IT 58
article thumbnail

New Safe Harbor Deal Between EU and U.S. May Be Imminent

Hunton Privacy

According to Bloomberg BNA , Paul F. Nemitz, Director for Fundamental Rights and Union Citizenship at the Directorate-General Justice of the European Commission, said at a privacy conference that he hoped a new U.S.-EU Safe Harbor agreement would be reached by the evening of Monday, February 1, 2016. According to Nemitz, V?ra Jourová, European Commissioner for Justice, Consumers and Gender Equality Justice, will go to Parliament on Monday evening to “inform member states…of the outcome [of

Privacy 56
article thumbnail

What tools do the fbi use when seizing computers or the curious case of the mouse jiggler device

Elie

This post summarizes which equipement the FBI use to seize the content of servers and laptops despite many of them use full disk encryption and which defenses exist.

article thumbnail

New European Cyber Laws (NISD) – Do you understand the potential impact on your business?

CGI

New European Cyber Laws (NISD) – Do you understand the potential impact on your business? Anonymous. Fri, 01/22/2016 - 04:18. I previously blogged about the new General Data Protection Regulation (GDPR) agreed as European legislation in December 2015. This blog focuses on the new Network and Information Security Directive (NISD) which was agreed at the same time and also has significant implications for business. table.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

Taking the complexity out

Attensa

At Attensa we work with complex organizations that are solving complex problems. Effectively managing information and knowledge is a core part of the business strategies of these organizations. But often complexity begets complexity. In the universe of business and professional information services, the complexity wave has been playing out for decades as providers and their customers struggle with applying pre-digital content metaphors to a digital world.

article thumbnail

New year! New North America office!

Preservica

I am excited to announce that as the newly independent Preservica, we have just moved into our new North America office on Milk Street, in the heart of downtown Boston, MA. The move will allow us to increase our focus on serving customers right across the region - as well as of course the growing community of Preservica users in the Boston area, including the Massachusetts State Archives, the City of Boston, Emerson College and The Trustees of Reservations, to name just a few.

article thumbnail

The Streaming Conundrum: Forgetting What I Heard

John Battelle's Searchblog

The post The Streaming Conundrum: Forgetting What I Heard appeared first on John Battelle's Search Blog. Once upon a time, I’d read the yearly lists of “best albums” from folks like Rick Webb or Marc Ruxin , and immediately head over to the iTunes store for a music-buying binge. Afterwards, I’d listen happily to my new music for days on end, forging new connections between the bands my pals had suggested and my own life experiences.

article thumbnail

FTC Releases New Report on Big Data

Hunton Privacy

On January 6, 2015, the Federal Trade Commission released its report on big data entitled Big Data: A Tool for Inclusion or Exclusion? Understanding the Issues. The report is a compilation of a seminar on alternative scoring products, the discussions at a big data public workshop held on September 15, 2014, and other recent research and public commentary on the issue.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Speaking at AIIM16

JKevinParker

At this year's AIIM Conference , I will be speaking on SharePoint planning for user adoption: Don't Make Us Think: Getting SharePoint to be Useful, Usable, and Used. SharePoint is infamous for being unuseful, unusable, and unused. But the fault is not in the technology—usually, it is a failure to adequately plan and execute practical business solutions that causes SharePoint projects to flounder.

article thumbnail

Optimizing Healthcare Value with Prescriptive Analytics – Part 1

CGI

Optimizing Healthcare Value with Prescriptive Analytics – Part 1. kathy.jacquay@…. Wed, 01/20/2016 - 01:46. The healthcare system of the future will be one where continuous improvements in patient experience and operational efficiency are informed by data and decisions that are directed by prescriptive analytics. To achieve continuous improvement and drive optimization of healthcare value, we have to shift analytics from monitoring and reporting of what has happened, to using analytics to make d

article thumbnail

DB2 for z/OS: Thoughts on History and Archive Tables

Robert's Db2

I'll state up front that I'm using the terms "history table" and "archive" table not in a generic sense, but as they have technical meaning in a DB2 for z/OS context. A history table is paired with a "base" table that has been enabled f or system-time temporal support (introduced with DB2 10 for z/OS), and an archive table goes with a base table that has been enabled for DB2-ma nage d archiving (also known as "transparent archi ving" - - a feature delivered with DB2 11).

article thumbnail

Preservica wins two ARMA LIVE! ‘Best In Show’ Awards

Preservica

What a great start to 2016! After an exciting 2015, it was wonderful to read in the latest Jan/Feb issue of ARMA International’s Information Management magazine that Preservica has been awarded not just one, but two “ Best In Show ” awards for our contribution to the ARMA LIVE! conference in Washington DC at the end of last year. Preservica took the top honors for Best Product or Product Demo , and Best Industry Intelligence Session for our workshop “Will Your Vital Long-Term Digital Records Sti

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

On Medium, Facebook, and the Graph Conflict

John Battelle's Searchblog

The post On Medium, Facebook, and the Graph Conflict appeared first on John Battelle's Search Blog. I double took upon arriving at Medium just now, fingers flexed to write about semi-private data and hotel rooms (trust me, it’s gonna be great). But upon my arrival, I was greeted thusly: Now, I have no categorical beef with Facebook, I understand the value of its network as much as the next publisher.

IT 53
article thumbnail

Dutch Law Includes General Data Breach Notification Obligation and Larger Fines for Violations of the Data Protection Act

Hunton Privacy

On January 1, 2016, a Dutch law became effective that (1) includes a general obligation for data controllers to notify the Data Protection Authority (“DPA”) of data security breaches, and (2) authorizes the DPA to impose direct fines for violations of the Data Protection Act. Under the law, data controllers are required to immediately notify the DPA of any data security breaches that have, or are likely to have, serious adverse consequences to the protection of personal data.

article thumbnail

Senate Judiciary Committee Passes Amended Judicial Redress Act

Hunton Privacy

On January 28, 2016, the Senate Judiciary Committee passed the Judicial Redress Act (the “Act”), which would give EU citizens the right to sue over certain data privacy issues in the U.S. The Act passed after an amendment was approved which would condition EU citizens’ right to sue on EU Member States (1) allowing companies to transfer personal data to the U.S. for commercial purposes and (2) having personal data transfer policies which do not materially impede the national security interests of

article thumbnail

Taiwan Amends Personal Data Protection Law

Hunton Privacy

On December 30, 2015, Taiwan’s Office of the President issued an order to promulgate certain amendments (the “Amendments”) to Taiwan’s Personal Data Protection Law (the “PDPL”). The Amendments revise 12 articles in the PDPL. The Amendments concern the collection and use of sensitive personal data, the form of consent for the collection and use of non-sensitive personal data, and the imposition of criminal liability for violations of certain provisions of the PDPL.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

Dear Microsoft. I Want To Use Office 365. But…

John Battelle's Searchblog

The post Dear Microsoft. I Want To Use Office 365. But… appeared first on John Battelle's Search Blog. Here’s what I encountered when I, as a first time ever user, was directed to a document that lived in Office 365 World: Holy crap, Microsoft! I just wanted to read the document a colleague at another (much larger, older, and traditional) company had sent me.

49
article thumbnail

Centre for Information Policy Leadership to Co-Host APEC Privacy Workshop in Lima, Peru

Hunton Privacy

On February 22, 2016, the Centre for Information Policy Leadership (“CIPL”), together with TRUSTe, the Information Accountability Foundation and Information Integrity Solutions, will co-host a workshop on Building a Dependable Framework for Privacy, Innovation and Cross-Border Data Flows in the Asia-Pacific Region in Lima, Peru. The workshop will be held in the margins of the upcoming meetings of the APEC Electronic Commerce Steering Group and its Data Privacy Subgroup in Lima from February 23-

Privacy 45
article thumbnail

Pew Research Center Issues Report on Attitudes Toward Sharing Personal Information with Private Sector

Hunton Privacy

On December 30, 2015, the Pew Research Center released a report on the results of a recent survey that asked 461 Americans about their feelings toward sharing personal information with companies. The survey found that a “significant minority” of American adults have felt “confused over information provided in company privacy policies, discouraged by the amount of effort needed to understand the implications of sharing their data, and impatient because they wanted to learn more about the informat

Privacy 45
article thumbnail

CIPL Holds Safe Harbor “Essential Equivalence” Roundtable with Top European Voices

Hunton Privacy

On January 28, 2016, the Centre for Information Policy Leadership (“CIPL”) held a special roundtable at Hunton & Williams’ Brussels office to examine the “essential equivalence” requirement for protection of data transfers to non-EU countries set by the Court of Justice of the European Union’s (“CJEU’s”) Schrems decision. The roundtable brought together leading lawyers, corporate privacy officers, legal experts, regulators and policymakers to discuss the critical issues and impact of t

Privacy 40
article thumbnail

The Big Payoff of Application Analytics

Outdated or absent analytics won’t cut it in today’s data-driven applications – not for your end users, your development team, or your business. That’s what drove the five companies in this e-book to change their approach to analytics. Download this e-book to learn about the unique problems each company faced and how they achieved huge returns beyond expectation by embedding analytics into applications.

article thumbnail

Russian Data Protection Authority Releases 2016 Audit Plan for Localization Law

Hunton Privacy

On January 13, 2016, the Russian Data Protection Authority ( Roscommandzor ) released its plan for audits this year to assess compliance with Russia’s data localization law , which became effective on September 1, 2015. The localization law requires companies to store the personal data of Russians in databases located in Russia. The audit plan indicates that the Roscommandzor will audit large, multinational companies doing business in numerous jurisdictions and processing the personal data of Ru

article thumbnail

Senate Vote on Judicial Redress Act Delayed

Hunton Privacy

On January 21, 2016, a Senate Judiciary Committee vote on the Judicial Redress Act, which would give EU citizens the right to sue over certain data privacy issues in the U.S., has reportedly been postponed. As reported by Forbes, the vote may have been delayed due to amendments to the fifth paragraph of the bill, which deals with litigation pursuant to the act.

article thumbnail

New European Cyber Laws – Do you understand potential impact on your business?

CGI

New European Cyber Laws – Do you understand potential impact on your business? ravi.kumarv@cgi.com. Thu, 01/14/2016 - 05:54. Two new pieces of European legislation/regulation were agreed in December 2015. I read a recent article in the FT, Network and Information Security Directive (NISD), also known as the Cyber Security Directive, was agreed on the 8th December, followed a week later by the General Data Protection Regulation (GDPR ), agreed on the 15th December.

GDPR 40